|
|
|
|
LEADER |
04927nam a22005295i 4500 |
001 |
978-3-030-03937-0 |
003 |
DE-He213 |
005 |
20210623013358.0 |
007 |
cr nn 008mamaa |
008 |
190101s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030039370
|9 978-3-030-03937-0
|
024 |
7 |
|
|a 10.1007/978-3-030-03937-0
|2 doi
|
050 |
|
4 |
|a QA76.9.C66
|
072 |
|
7 |
|a UBJ
|2 bicssc
|
072 |
|
7 |
|a COM079000
|2 bisacsh
|
072 |
|
7 |
|a UBJ
|2 thema
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
|
|a Kizza, Joseph Migga.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Ethical and Secure Computing
|h [electronic resource] :
|b A Concise Module /
|c by Joseph Migga Kizza.
|
250 |
|
|
|a 2nd ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XV, 285 p. 23 illus., 9 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Undergraduate Topics in Computer Science,
|x 1863-7310
|
505 |
0 |
|
|a Morality and the Law -- Ethics and Ethical Analysis -- Ethics and the Professions -- Anonymity, Security, Privacy, and Civil Liberties -- Intellectual Property Rights and Computer Technology -- Social Context of Computing -- Software Issues: Risks and Liabilities -- Computer Crimes -- Cyberbullying -- Artificial Intelligence, Virtualization, and Cyberspace -- Ethical, Privacy, and Security Issues in Social Network Ecosystems -- Evolving Cyberspace: The Marriage of 5G and the Internet of Things (IoT) Technologies.
|
520 |
|
|
|a This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: Introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres Describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties Examines intellectual property rights in the context of computing, including the risks and liabilities associated with software Discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health Reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination Considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies Includes learning objectives, discussion questions and exercises throughout the book This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks. Dr. Joseph Migga Kizza is Professor and Associate Dean of the College of Engineering and Computer Science, and former Director of the Center for Information Security and Assurance, at the University of Tennessee at Chattanooga, USA. He is also the author of the successful Springer titlesEthical and Social Issues in the Information Age and Guide to Computer Network Security.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Philosophy.
|
650 |
1 |
4 |
|a Computers and Society.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24040
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Philosophy of Technology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/E34050
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030039363
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030039387
|
830 |
|
0 |
|a Undergraduate Topics in Computer Science,
|x 1863-7310
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-03937-0
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|